Abstract
Recently, face recognition has received a great of attention because digital camera can be widely available. It has many applications including security management in the airport and the IC card for e-commerce. In this paper, we introduce a watermark technique for image authentication with a personal face. We try to compute the eigenface of a personal image and encode the eigenface features with bar-code. The bar-coded feature values are then embedded into the image that is to be authenticated. Our simulation shows the similarity measures of the watermark extracted from the damaged image under various attack are vary high and indicate the proposed method is very feasible for real applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice Hall, Englewood Cliffs (1999)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons, Chichester (1996)
Nikolaidis, N., Pitas, I.: Copyright protection of images using robust digital signatures. In: Proceedings, IEEE International Conference on Acoustics, Speech and Signal Processing, May, vol. 4, pp. 2168–2171 (1996)
Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16(4), 573–586 (1998)
Sia, S.-G., Boncelet, C.G., Arce, G.R.: A Multi-resolution Watermark for Digital Image. In: IEEE, pp. 518–521 (1997)
Cox, I., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Wa-termarking for Multimedia. In: IEEE Transaction on Image Processing, December 1997, vol. 6, pp. 1673–1687 (1997)
Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. IEEE Transactions on Image Processing 10(4), 643–649 (2001)
Jain, A.K., Uludag, U., Hsu, R.-L.: Hiding a face in a fingerprint image. In: Proc. ICPR 2002, 16. International Conference on Pattern Recognition, Quebec City, Quebec, Canada, August 11-15, vol. 3, pp. 756–759 (2002)
Jain, A.K., Uludag, U.: Hiding fingerprint minutiae in images. In: Proc. AutoID 2002, 3.Workshop on Automatic Identification Advanced Technologies, Tarrytown, New York, USA, March 14-15, pp. 97–102 (2002)
Turk, M., Pentland, A.: Eigenfaces for Recognition. Journal of Cognitive Neutroscience 3(1) (1991)
Schneier, B.: Inside risks: the uses and abuses of biometrics. Source Communications of the ACMÂ 42(8), 136 (1999)
Wakaumi, H., Komaoka, T., Hankui, E.: Grooved Bar-Code Recognition System with Tape-Automated-Bonding Head Detection Scanner. IEEE Transactions on Magnetics 36(1), 366–370 (2000)
Kuroki, M., Yoneoka, T., Satou, T., Takagi, Y., Kitamura, T., Kayamori, N.: Barcode recognition system using image processing. In: 6th International Conference on Emerging Technologies and Factory Automation Proceedings, ETFA 1997, September 9-12, pp. 568–572 (1997)
Wakaumi, H., Ajiki, H., Hankui, E., Nagasawa, C.: Magnetic grooved bar-code recognition system with slant MR sensor. IEE Proceedings of Science, Measurement and Technology 147(3), 131–136 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, CH., Chang, LW. (2004). A Digital Watermarking Scheme for Personal Image Authentication Using Eigenface. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3333. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30543-9_52
Download citation
DOI: https://doi.org/10.1007/978-3-540-30543-9_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23985-7
Online ISBN: 978-3-540-30543-9
eBook Packages: Computer ScienceComputer Science (R0)